Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
4s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe
Resource
win7-20221111-en
10 signatures
150 seconds
General
-
Target
c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe
-
Size
2.1MB
-
MD5
1207c3fa6aca6423d82843958c6b566b
-
SHA1
67a6ee64f744ab9df86bbc74132934a9a6613dfc
-
SHA256
c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a
-
SHA512
6e463b9db32dbc1a78fc5f202a56f3ca259cba4e7c868912b686d666a8347dd8e289ada3bdea22449f9ccd07ae1537832c74b8f321bdf15d825aef57272b52d5
-
SSDEEP
24576:LmY2FUYkUQXYuHnvrCRpeVTWPHW5ER43ZpjnN/3W8HON1h:KUU8YuHT7TWPH+ERuznN/3WH1h
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 816 netsh.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1096 set thread context of 1912 1096 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 30 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 1096 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1096 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1096 wrote to memory of 556 1096 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 28 PID 1096 wrote to memory of 556 1096 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 28 PID 1096 wrote to memory of 556 1096 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 28 PID 1096 wrote to memory of 556 1096 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 28 PID 1096 wrote to memory of 1912 1096 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 30 PID 1096 wrote to memory of 1912 1096 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 30 PID 1096 wrote to memory of 1912 1096 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 30 PID 1096 wrote to memory of 1912 1096 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 30 PID 1096 wrote to memory of 1912 1096 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 30 PID 556 wrote to memory of 816 556 cmd.exe 31 PID 556 wrote to memory of 816 556 cmd.exe 31 PID 556 wrote to memory of 816 556 cmd.exe 31 PID 556 wrote to memory of 816 556 cmd.exe 31 PID 1096 wrote to memory of 1912 1096 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 30 PID 1096 wrote to memory of 1912 1096 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 30 PID 1096 wrote to memory of 1912 1096 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 30 PID 1096 wrote to memory of 1912 1096 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 30 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe"C:\Users\Admin\AppData\Local\Temp\c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1096 -
C:\Windows\SysWOW64\cmd.execmd.exe /c netsh firewall set opmode disable2⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable3⤵
- Modifies Windows Firewall
PID:816
-
-
-
C:\Users\Admin\AppData\Local\Temp\c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exeC:\Users\Admin\AppData\Local\Temp\c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe2⤵PID:1912
-